{"title":"Intelligent cross-layer adaptation scheme for wireless links with QoS-guaranteed traffic","authors":"Younes Abdi, P. Azmi","doi":"10.1109/ISTEL.2010.5734057","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734057","url":null,"abstract":"Quality-of-service (QoS)-guaranteed traffic is of critical importance in real-time multimedia communications. In this paper, a novel approach to systematic cross-layer monitoring, learning, and optimization using artificial neural networks is developed for wireless links with QoS-guaranteed traffic. The proposed method is used to jointly optimize the design parameters of the adaptive modulation and coding (AMC) scheme at the physical layer with the truncated automatic repeat request (ARQ) protocol at the data link layer. The structure, performance, and cooperation of the artificial neural networks used in the proposed adaptive system are disclosed in detail and the capability of the proposed method in maximizing the overall system throughput and maintaining the QoS guarantees in non-stationary wireless links is discussed and verified by a set of illustrative simulation results.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust image watermarking based on multiwavelet parent-child relation and adaptive support vector regression","authors":"Hamed Ghodrati, H. Danyali","doi":"10.1109/ISTEL.2010.5734142","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734142","url":null,"abstract":"In this paper, a robust image watermarking algorithm in multiwavelet domain is proposed. Multiwavelet transform provides good energy compaction and trade off between imperceptibility and watermark robustness properly. In the proposed algorithm, after performing a three-level multiwavelet decomposition, a parent-child relationship is defined between coefficients in different subbands. To increase the robustness, the relationship between the root node and its offspring nodes is learnt by support vector regression (SVR) and then the watermark is embedded and extracted based on this inherent relation. The good energy compaction property of multiwavelet can cause small number of coefficients containing most of image energy, therefore the range of target output values of SVR is extended which notably made inaccuracy in predictions. In order to overcome this problem, we proposed a procedure, which applies the inputs to SVR in an adaptive way. The experimental results show, the proposed algorithm possesses acceptable perceptual quality, while it is robust against common attacks such as JPEG, low-pass filtering, noise addition, cropping and resizing, etc.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131820135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modification of the relative distance for free text keystroke authentication","authors":"H. Davoudi, E. Kabir","doi":"10.1109/ISTEL.2010.5734085","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734085","url":null,"abstract":"Unlike many other biometrics, keystroke authentication does not require any additional hardware. Pressing time of keystrokes is the main source of information and can be extracted continuously during an ongoing session, even after the login time. The relative distance, which is a common measure in this field, is defined based on the relative typing speed of different digraphs. To improve the accuracy of authentication based on this measure, we propose to assign a weight to each digraph depending on its typing speed reliability; this expands the effectiveness of reliable digraphs in distance computation. The proposed method is tested on 315 typing samples of 21 users. The results show that our method will improve the accuracy in both forms of FAR and FRR measures.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LayeredCast - a hybrid Peer-to-Peer live layered video streaming protocol","authors":"M. Moshref, R. Motamedi, H. Rabiee, M. Khansari","doi":"10.1109/ISTEL.2010.5734106","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734106","url":null,"abstract":"Peer-to-Peer overlay networks are an attractive foundation for video streaming. However, live Peer-to-Peer media streaming systems face many challenges such as bandwidth heterogeneity, node churn, and selfish nodes. Although many tree based and mesh based streaming protocols have been proposed, each has its own drawbacks such as unreliability and unfairness in tree based and long startup delay and complex scheduling in mesh based protocols. In this paper, we propose a new video streaming protocol called LayeredCast main features of which are: 1) Hybrid: Drawbacks of the simple approaches are compensated using a hybrid of mesh and tree overlays. 2) Layered Video: Provides an adaptive scheme to enhance the video quality using a layered video codec for heterogeneous clients. 3) QoS: LayeredCast scheduling aims at moving complexity of Multi-Service network core to the network clients application layer, thus providing better QoS over simple regular networks. LayeredCast's tree network pushes the base layer to all peers while the enhancement layers and missing base layer segments are pulled over a mesh network by peers with extra bandwidth using a new data-driven scheduling scheme. We have evaluated the performance of LayeredCast on an innovative simulation framework. Simulation results verify better performance of LayeredCast in term of decodable video frames over CoolStreaming, especially when network resources are limited.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive and quantitative comparison of J2EE vs. .NET based on attack surface metric","authors":"S. Nasiri, R. Azmi, R. Khalaj","doi":"10.1109/ISTEL.2010.5734024","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734024","url":null,"abstract":"Development platforms have an important role in software's development and production. Prior work has shown that a system's attack surface measurement serves as a reliable proxy for security of similar software systems. A key challenge in attack surface measurement method is the estimation of the damage potential ratio. In our approach, it is applied Common Vulnerability Scoring System (CVSS) as a reliable metrics than the prior work. We show that, the attack surface of .NET platform is less than J2EE. Since only part of development environment is applied, so measuring the actual attack surface is depended on usage.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of opportunistic frequency diversity strategy in cognitive radio systems","authors":"M. Ghaznavi, A. Jamshidi","doi":"10.1109/ISTEL.2010.5733989","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5733989","url":null,"abstract":"Cognitive radio is a new technology that solves the problem of spectrum scarcity. In this technology, secondary users, users that do not have license to use the spectrum, can access the frequency bands that are idle in time or frequency whenever the primary users (PUs), users that have license to access the spectrum, are not using these bands. So, cognitive radio networks improve the spectrum utilization. In this paper, with the assumption that the secondary users operate in a wideband communication system, first the bandwidth of the system is divided into some equal parts that are larger than the coherent bandwidth of the channel, and then the capacity of the channel by considering the secondary user's outage capacity criteria is compared in two structures: one with the use of frequency diversity technique and other without the use of frequency diversity.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object detection with novel shape representation using bounding edge fragments","authors":"Mohammad Anvaripour, H. Ebrahimnezhad","doi":"10.1109/ISTEL.2010.5734140","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734140","url":null,"abstract":"This paper proposes a new method to detect objects in images. Boundaries contain shape of the objects. To detect objects in cluttered images, we use boundary fragments. Boundary fragments are obtained by our new training procedure. Poisson equation is used to divide edges and extract generic model of the object. Gaussian Mixture Model (GMM) is used to model shape of the object. This creates relation between local boundary fragments. To localize our desired object in image, a voting process is performed in Hough space. A scale adaptive search algorithm is used in this voting space to find the most probable regions of object presence. By learned GMM, shape of the object is obtained from test image. We remove false positives, usual problems in object detection tasks, by matching generic model to the extracted shapes. Local orientations histograms of the objects model are used for matching. We evaluate our method and compare with state-of-the-art methods. Experimental results show the power of our proposed method in detection and its robustness in face to scale and translation variations.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"674 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133817315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-based fuzzy web services clustering","authors":"N. Gholamzadeh, F. Taghiyareh","doi":"10.1109/ISTEL.2010.5734117","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734117","url":null,"abstract":"Web services are the most important event in distributed computing today and have achieved great popularity among software developers. A critical step in the process of developing applications based on web services is web service discovery, i.e., the identification of existing web services that can potentially be used in the context of a new web application.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124195603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed power allocation based on coalitional and noncooperative games for wireless networks","authors":"H. Khayatian, R. Saadat, G. Mirjalily","doi":"10.1109/ISTEL.2010.5734054","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734054","url":null,"abstract":"The performance in cooperative communication depends on careful resource allocation such as relay selection and power Control. This paper introduces novel concepts for relay selection schemes based on coalitional game theory which establishes the dynamic formation of coalitions in multi user wireless networks. Then we present a power allocation for wireless data transmission among coalition based on a noncooperative game. Through this games theoretical framework, source nodes are able to self organize and form a stable coalitions and set their transmission powers in a completely distributed manner. Numerical results denote that the proposed algorithm achieves significant reduction in energy consumption and improvement in payoff for the users, compared to noncooperative power control approaches.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust facial 2D motion model estimation for 3D head pose extraction and automatic camera mouse implementation","authors":"Masoomeh Nabati, A. Behrad","doi":"10.1109/ISTEL.2010.5734135","DOIUrl":"https://doi.org/10.1109/ISTEL.2010.5734135","url":null,"abstract":"In this paper, we present a novel approach to 3D head pose estimation from monocular camera images for the control of mouse pointer movements on the screen and clicking events. This work is motivated by the goal of providing a non-contact instrument to control the mouse pointer on a PC system for handicapped people with severe disabilities using low-cost and widely available hardware. The required information is derived from video data captured using a monocular web camera mounted on the computer monitor. Our approach proceeds in six stages. First, the face area is extracted using Haar-like features and AdaBoost algorithm. Second, the locations of the point features are detected and tracked over video frames by LK algorithm. Third, the 2D transformation model between consecutive frames is estimated by matching features and robust RANSAC algorithm. Fourth, the estimated 2D transformation model is applied to four supposed points on the face area. Then, the 3D rotation matrix and translation vector between the web camera and 3D head pose are estimated using four points correspondences. Finally, the 3D rotation and translation matrix is applied for estimating the mouse pointer movements on the PC screen and clicking events. Experimental results showed the promise of the algorithm.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}